The UNF Package. R topics documented: June 2, Title Tools for creating universal numeric fingerprints for data. Version 1.16.

Size: px
Start display at page:

Download "The UNF Package. R topics documented: June 2, Title Tools for creating universal numeric fingerprints for data. Version 1.16."

Transcription

1 The UNF Package June 2, 2007 Title Tools for creating universal numeric fingerprints for data. Version 1.16 Date Author Micah Altman Description Computes a univeral numeric fingerprint of the data. Maintainer Micah Altman <Micah_Altman@harvard.edu> Dialect R, S-Plus Depends R (>= 2.0) Imports utils License GPL 2.0 URL R topics documented: signifz unf Index 6 1

2 2 signifz signifz round values to specified number of significant digits Description Rounds the value to a specified number of significant digits, using IEEE 754 rounding towards zero rounding mode Usage signifz (x, digits=6) Arguments x digits A numeric vector. integer indicating the precision to be used Details signifz rounds the values in its first argument to the specified number of significant digits, using IEC 60559/IEEE 754 round towards zero mode. Rounding toward zero assures that signifz(signifz(x,digits=m),digits=n) = signifz(x,digits=n) for m > n, an important property for creating approximate fingerprints. It can, however, produce more rounding error than rounding toward nearest. The maximum log relative error (LRE) for the former is (digits-1) while the maximum LRE for the latter is digits. Hence, you may wish to use one more significant digit with signifz than with signif. Author(s) Micah Altman Micah_Altman@harvard.edu See Also signif, unf Examples # note the difference signif(pi,digits=5) signifz(pi,digits=5)

3 unf 3 unf universal numeric fingerprint Description Usage A universal numeric fingerprint is used to guarantee that a defined subset of data is substantively identical to a comparison subset. Two fingerprints will match if and only if the subset of data generating them are identical, when represented using a given number of significant digits. Arguments data digits ndigits cdigits version rowindexvar roworder x Details char unf(data, digits = NULL, ndigits = { if (is.null(digits)) { 8 } else (digits)}, cdigits = { if (is.null(digits)) { 128 } else (digits)}, version = 4.1, rowindexvar = NULL, roworder = { if (is.null(rowindexvar)) { NULL } else { order(rowindexvar) }}) unf2base64 (x) as.character.unf(x,...) as.unf(char) A numeric or charactervector or data frame. Other types will be computed. number of digits to use, see cdigits and ndigits number of significant digits for rounding for numeric values prior to applying cryptographic hash number of characters for truncation prior to applying cryptographic hash algorithmic version. Always use the same version of the algorithm to check a signature. a vector of rowids. The resulting data will be sorted by this vector before the UNF s are computed. This will affect the UNF for each vector. This is equivalent to unf(df[order(rowindexvar),] explicit sort ordering, an alternative to using rowindexvar a unf object, returned by unf a character vector of UNF character strings... part of the as.character generic, ignored A UNF is created by rounding data values (or truncating strings) to a known number of digits (characters), representing those values in standard form (as 32bit unicode-formatted strings), and applying a fingerprinting method (such as cryptographic hashing function) to this representation. UNF s are computed from data values provided by the statistical package, so they directly reflect the internal representation of the data the data as the statistical package interprets it.

4 4 unf Value A UNF differs from an ordinary file checksum in several important ways: 1. UNF s are format independent. The UNF for the data will be the same regardless of whether the data is saved as a R binary format, SAS formatted file, Stata formatted file, etc., but file checksums will differ. 2. UNF s are robust to insignificant rounding error. A UNF will also be the same if the data differs in non-significant digits, a file checksum not. 3.UNF s detect misinterpretation of the data by the statistical software. If the statistical software misreads the file, the resulting UNF will not match the original, but the file checksums may match. 4.UNF s are strongly tamper resistant. Any accidental or intentional changes to the data values will change the resulting UNF. Most file checksums s and descriptive statistics detect only certain types of changes. UNF libraries are available for standalone use, for use in C++, and for use with other packages. The unf function returns a UNF object which can be converted using as.character to a signature string. For example: UNF:3:10,128:ZNQRI14053UZq389x0Bffg== This representation identifies the signature as a fingerprint, using version 3, of the algorithm, computed to 10 significant digits for numbers and 128 for characters. The segment following the final colon is the actual fingerprint in base64 encoded format. Note: to compare two UNF s, or sets of unfs, one often wants to compare only the base64 portion. Use unf2base64 for this, which will extract the base64 portion. Use summary to produce a single UNF from set of vectors, by computing a new UNF across the base64 strings. The order in which the set of vectors is important. Author(s) Micah Altman Micah_Altman@harvard.edu References Altman, M., J. Gill and M. P. McDonald Numerical Issues in Statistical Computing for the Social Scientist. John Wiley & Sons. issues/ [Defining the algorithm] Altman, M., & G. King A Proposed Standard for the Scholarly Citation of Quantitative Data. D-Lib 13(3/4). [Citation standard using UNF s] Examples # simple example v=1:100/ vr=signif(v,digits=2)

5 unf 5 # print.unf shows in standard format, including version and digits print(unf(v)) # as.character will return base64 section only for comparisons as.character(unf(v)) # this is false, since computed base64 values UNF's differ unf2base64(unf(v))==unf2base64(unf(vr)) # this is true, since computed UNF's base64 values are the same at 2 significant digits unf2base64(unf(v, digits=2))==unf2base64(unf(vr)) # WARNING: this is false, since UNF's values are the same, but # number of calculated digits differ, probably not the comparison # you intend identical(unf(v,digits=2),unf(vr)) # compute a fingerprint of longley at 10 significant digits of accuracy for numeric values # this fingerprint can be stored and verified when reading the dataset # later data(longley) mf10<-unf(longley,ndigits=10); # this produces the same results as using signifz(), but not signif() mf11<-unf(signifz(longley,digits=10)) unf2base64(mf11)==unf2base64(mf10) #printable representation, prints seven UNF's, one for each vector print(mf10) # summarizes the base64 portion of the unf for each vector into a # single base64 UNF representing entire dataset summary(mf10)

6 Index Topic debugging unf, 2 Topic math signifz, 1 Topic misc signifz, 1 unf, 2 as.character.unf (unf), 2 as.unf (unf), 2 signifz, 1 unf, 2 unf2base64 (unf), 2 6

Package UNF. June 13, 2017

Package UNF. June 13, 2017 Version 2.0.6 Package UNF June 13, 2017 Title Tools for Creating Universal Numeric Fingerprints for Data Date 2017-06-13 Description Computes a universal numeric fingerprint (UNF) for an R data object.

More information

A Fingerprint Method for Scientific Data Verification 1 Version: 09/14/2009

A Fingerprint Method for Scientific Data Verification 1 Version: 09/14/2009 A Fingerprint Method for Scientific Data Verification 1 Version: 09/14/2009 Micah Altman Institute for Quantitative Social Science, Harvard University 1737 Cambridge St. # 325 Cambridge, MA 02138 Micah_Altman@harvard.edu

More information

The VDCutil Package. July 10, 2006

The VDCutil Package. July 10, 2006 Title utilities supporting the VDC system Version 1.12 Author Micah Altman, Akio Sone Date 2006-07-06 The VDCutil Package July 10, 2006 The VDC system is an open source digital library system for quantitative

More information

Data Types Literals, Variables & Constants

Data Types Literals, Variables & Constants C/C++ PROGRAMMING Data Types Literals, Variables & Constants Copyright 2013 Dan McElroy Under the Hood As a DRIVER of an automobile, you may not need to know everything that happens under the hood, although

More information

Avro Specification

Avro Specification Table of contents 1 Introduction...2 2 Schema Declaration... 2 2.1 Primitive Types... 2 2.2 Complex Types...2 2.3 Names... 5 2.4 Aliases... 6 3 Data Serialization...6 3.1 Encodings... 7 3.2 Binary Encoding...7

More information

Avro Specification

Avro Specification Table of contents 1 Introduction...2 2 Schema Declaration... 2 2.1 Primitive Types... 2 2.2 Complex Types...2 2.3 Names... 5 3 Data Serialization...6 3.1 Encodings... 6 3.2 Binary Encoding...6 3.3 JSON

More information

Variables and Data Representation

Variables and Data Representation You will recall that a computer program is a set of instructions that tell a computer how to transform a given set of input into a specific output. Any program, procedural, event driven or object oriented

More information

Data Entry, and Manipulation. DataONE Community Engagement & Outreach Working Group

Data Entry, and Manipulation. DataONE Community Engagement & Outreach Working Group Data Entry, and Manipulation DataONE Community Engagement & Outreach Working Group Lesson Topics Best Practices for Creating Data Files Data Entry Options Data Integration Best Practices Data Manipulation

More information

Cryptographic Hash Functions. Rocky K. C. Chang, February 5, 2015

Cryptographic Hash Functions. Rocky K. C. Chang, February 5, 2015 Cryptographic Hash Functions Rocky K. C. Chang, February 5, 2015 1 This set of slides addresses 2 Outline Cryptographic hash functions Unkeyed and keyed hash functions Security of cryptographic hash functions

More information

Package datasets.load

Package datasets.load Title Interface for Loading Datasets Version 0.1.0 Package datasets.load December 14, 2016 Visual interface for loading datasets in RStudio from insted (unloaded) s. Depends R (>= 3.0.0) Imports shiny,

More information

BEFORE NOON-time of Wed 24 April, 2019

BEFORE NOON-time of Wed 24 April, 2019 Page 1 (c) Copyright A. Gerbessiotis. All rights reserved. Posting this document on the Web, other than its original location at NJIT, is strictly prohibited unless there is an explicit written authorization

More information

XDS An Extensible Structure for Trustworthy Document Content Verification Simon Wiseman CTO Deep- Secure 3 rd June 2013

XDS An Extensible Structure for Trustworthy Document Content Verification Simon Wiseman CTO Deep- Secure 3 rd June 2013 Assured and security Deep-Secure XDS An Extensible Structure for Trustworthy Document Content Verification Simon Wiseman CTO Deep- Secure 3 rd June 2013 This technical note describes the extensible Data

More information

Full file at

Full file at Java Programming, Fifth Edition 2-1 Chapter 2 Using Data within a Program At a Glance Instructor s Manual Table of Contents Overview Objectives Teaching Tips Quick Quizzes Class Discussion Topics Additional

More information

Package geojsonsf. R topics documented: January 11, Type Package Title GeoJSON to Simple Feature Converter Version 1.3.

Package geojsonsf. R topics documented: January 11, Type Package Title GeoJSON to Simple Feature Converter Version 1.3. Type Package Title GeoJSON to Simple Feature Converter Version 1.3.0 Date 2019-01-11 Package geojsonsf January 11, 2019 Converts Between GeoJSON and simple feature objects. License GPL-3 Encoding UTF-8

More information

CSC Java Programming, Fall Java Data Types and Control Constructs

CSC Java Programming, Fall Java Data Types and Control Constructs CSC 243 - Java Programming, Fall 2016 Java Data Types and Control Constructs Java Types In general, a type is collection of possible values Main categories of Java types: Primitive/built-in Object/Reference

More information

Package Rserve. R topics documented: February 19, Version Title Binary R server

Package Rserve. R topics documented: February 19, Version Title Binary R server Version 1.7-3 Title Binary R server Package Rserve February 19, 2015 Author Simon Urbanek Maintainer Simon Urbanek Depends R (>= 1.5.0) Suggests

More information

Math 4242 Polynomial Time algorithms, IndependentSet problem

Math 4242 Polynomial Time algorithms, IndependentSet problem Math 4242 Polynomial Time algorithms, IndependentSet problem Many of the algorithms we have looked at so far have a reasonable running time. Not all algorithms do. We make this idea more precise. Definition:

More information

Package OLScurve. August 29, 2016

Package OLScurve. August 29, 2016 Type Package Title OLS growth curve trajectories Version 0.2.0 Date 2014-02-20 Package OLScurve August 29, 2016 Maintainer Provides tools for more easily organizing and plotting individual ordinary least

More information

Science Panel Discussion presentation: "A Data Sharing Story"

Science Panel Discussion presentation: A Data Sharing Story University of Massachusetts Medical School escholarship@umms University of Massachusetts and New England Area Librarian e-science Symposium 2012 e-science Symposium Apr 4th, 10:45 AM - 11:15 AM Science

More information

Chapter 2 Using Data. Instructor s Manual Table of Contents. At a Glance. Overview. Objectives. Teaching Tips. Quick Quizzes. Class Discussion Topics

Chapter 2 Using Data. Instructor s Manual Table of Contents. At a Glance. Overview. Objectives. Teaching Tips. Quick Quizzes. Class Discussion Topics Java Programming, Sixth Edition 2-1 Chapter 2 Using Data At a Glance Instructor s Manual Table of Contents Overview Objectives Teaching Tips Quick Quizzes Class Discussion Topics Additional Projects Additional

More information

Full file at

Full file at Java Programming: From Problem Analysis to Program Design, 3 rd Edition 2-1 Chapter 2 Basic Elements of Java At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class

More information

Package rjazz. R topics documented: March 21, 2018

Package rjazz. R topics documented: March 21, 2018 Type Package Title Official Client for 'Jazz' Version 0.1.7 Date 2018-03-19 Depends R (>= 3.1.0) Imports stats, RCurl Package rjazz March 21, 2018 This is the official 'Jazz' client. 'Jazz' is a lightweight

More information

Package dotcall64. January 11, 2018

Package dotcall64. January 11, 2018 Type Package Package dotcall64 January 11, 2018 Title Enhanced Foreign Function Interface Supporting Long Vectors Version 0.9-5.2 Date 2018-01-11 Description Provides.C64(), which is an enhanced version

More information

Language Features. 1. The primitive types int, double, and boolean are part of the AP

Language Features. 1. The primitive types int, double, and boolean are part of the AP Language Features 1. The primitive types int, double, and boolean are part of the AP short, long, byte, char, and float are not in the subset. In particular, students need not be aware that strings are

More information

Using the SA4 Command Line Interface (PRELIMINARY DRAFT)

Using the SA4 Command Line Interface (PRELIMINARY DRAFT) Using the SA4 Command Line Interface (PRELIMINARY DRAFT) This chapter describes the SecretAgent 4 command line interface. The options and usage are identical for Windows/MS-DOS and UNIX versions of SecretAgent.

More information

A Data Sharing System

A Data Sharing System Dataverse Network A Data Sharing System Merce Crosas (mcrosas@hmdc.harvard.edu) Director of Product Development Institute of Quantitative Social Science (IQSS) Harvard University A long history of data

More information

The DICOM Package. August 23, Title Import medical imaging data using the DICOM Standard

The DICOM Package. August 23, Title Import medical imaging data using the DICOM Standard The DICOM Package August 23, 2005 Version 0.12 Date 2005-8-23 Title Import medical imaging data using the DICOM Standard Author Brandon Whitcher Maintainer Brandon Whitcher

More information

Introducing Hashing. Chapter 21. Copyright 2012 by Pearson Education, Inc. All rights reserved

Introducing Hashing. Chapter 21. Copyright 2012 by Pearson Education, Inc. All rights reserved Introducing Hashing Chapter 21 Contents What Is Hashing? Hash Functions Computing Hash Codes Compressing a Hash Code into an Index for the Hash Table A demo of hashing (after) ARRAY insert hash index =

More information

ECMA-404. The JSON Data Interchange Syntax. 2 nd Edition / December Reference number ECMA-123:2009

ECMA-404. The JSON Data Interchange Syntax. 2 nd Edition / December Reference number ECMA-123:2009 ECMA-404 2 nd Edition / December 2017 The JSON Data Interchange Syntax Reference number ECMA-123:2009 Ecma International 2009 COPYRIGHT PROTECTED DOCUMENT Ecma International 2017 Contents Page 1 Scope...

More information

Package redux. May 31, 2018

Package redux. May 31, 2018 Title R Bindings to 'hiredis' Version 1.1.0 Package redux May 31, 2018 A 'hiredis' wrapper that includes support for transactions, pipelining, blocking subscription, serialisation of all keys and values,

More information

Course Outline and Objectives: Database Programming with SQL

Course Outline and Objectives: Database Programming with SQL Introduction to Computer Science and Business Course Outline and Objectives: Database Programming with SQL This is the second portion of the Database Design and Programming with SQL course. In this portion,

More information

Package frt. R topics documented: February 19, 2015

Package frt. R topics documented: February 19, 2015 Package frt February 19, 2015 Version 0.1 Date 2011-12-31 Title Full Randomization Test Author Giangiacomo Bravo , Lucia Tamburino . Maintainer Giangiacomo

More information

print inf + 42,"\n"; print NaN * 7,"\n"; print hex("0x "),"\n"; # Perl v or later

print inf + 42,\n; print NaN * 7,\n; print hex(0x ),\n; # Perl v or later NAME bigint - Transparent BigInteger support for Perl SYNOPSIS use bigint; $x = 2 + 4.5,"\n"; # BigInt 6 print 2 ** 512,"\n"; # really is what you think it is print inf + 42,"\n"; # inf print NaN * 7,"\n";

More information

Number Systems Prof. Indranil Sen Gupta Dept. of Computer Science & Engg. Indian Institute of Technology Kharagpur Number Representation

Number Systems Prof. Indranil Sen Gupta Dept. of Computer Science & Engg. Indian Institute of Technology Kharagpur Number Representation Number Systems Prof. Indranil Sen Gupta Dept. of Computer Science & Engg. Indian Institute of Technology Kharagpur 1 Number Representation 2 1 Topics to be Discussed How are numeric data items actually

More information

Package PKI. September 16, 2017

Package PKI. September 16, 2017 Version 0.1-5.1 Package PKI September 16, 2017 Title Public Key Infrastucture for R Based on the X.509 Standard Author Maintainer Depends R (>=

More information

Question 4: a. We want to store a binary encoding of the 150 original Pokemon. How many bits do we need to use?

Question 4: a. We want to store a binary encoding of the 150 original Pokemon. How many bits do we need to use? Question 4: a. We want to store a binary encoding of the 150 original Pokemon. How many bits do we need to use? b. What is the encoding for Pikachu (#25)? Question 2: Flippin Fo Fun (10 points, 14 minutes)

More information

Lecture 4: Hashes and Message Digests,

Lecture 4: Hashes and Message Digests, T-79.159 Cryptography and Data Security Lecture 4: Hashes and Message Digests Helsinki University of Technology mjos@tcs.hut.fi 1 Cryptographic hash functions Maps a message M (a bit string of arbitrary

More information

Package kirby21.base

Package kirby21.base Type Package Package kirby21.base October 11, 2017 Title Example Data from the Multi-Modal MRI 'Reproducibility' Resource Version 1.6.0 Date 2017-10-10 Author John Muschelli Maintainer

More information

Pace University. Fundamental Concepts of CS121 1

Pace University. Fundamental Concepts of CS121 1 Pace University Fundamental Concepts of CS121 1 Dr. Lixin Tao http://csis.pace.edu/~lixin Computer Science Department Pace University October 12, 2005 This document complements my tutorial Introduction

More information

Package testit. R topics documented: June 14, 2018

Package testit. R topics documented: June 14, 2018 Package testit June 14, 2018 Type Package Title A Simple Package for Testing R Packages Version 0.8 Description Provides two convenience functions assert() and test_pkg() to facilitate testing R packages.

More information

Systems Programming/ C and UNIX

Systems Programming/ C and UNIX Systems Programming/ C and UNIX Alice E. Fischer Lecture 5 Makefiles October 2, 2017 Alice E. Fischer Lecture 5 Makefiles Lecture 5 Makefiles... 1/14 October 2, 2017 1 / 14 Outline 1 Modules and Makefiles

More information

AP COMPUTER SCIENCE JAVA CONCEPTS IV: RESERVED WORDS

AP COMPUTER SCIENCE JAVA CONCEPTS IV: RESERVED WORDS AP COMPUTER SCIENCE JAVA CONCEPTS IV: RESERVED WORDS PAUL L. BAILEY Abstract. This documents amalgamates various descriptions found on the internet, mostly from Oracle or Wikipedia. Very little of this

More information

Informats. Informats Under UNIX. HEXw. informat. $HEXw. informat. Details CHAPTER 13

Informats. Informats Under UNIX. HEXw. informat. $HEXw. informat. Details CHAPTER 13 207 CHAPTER 13 Informats Informats Under UNIX 207 Informats Under UNIX This chapter describes SAS informats that have behavior or syntax this is specific to UNIX environments. Each informat description

More information

Topics Applications Most Common Methods Serial Search Binary Search Search by Hashing (next lecture) Run-Time Analysis Average-time analysis Time anal

Topics Applications Most Common Methods Serial Search Binary Search Search by Hashing (next lecture) Run-Time Analysis Average-time analysis Time anal CSC212 Data Structure t Lecture 18 Searching Instructor: George Wolberg Department of Computer Science City College of New York @ George Wolberg, 2016 1 Topics Applications Most Common Methods Serial Search

More information

Primitive Data Types: Intro

Primitive Data Types: Intro Primitive Data Types: Intro Primitive data types represent single values and are built into a language Java primitive numeric data types: 1. Integral types (a) byte (b) int (c) short (d) long 2. Real types

More information

unused unused unused unused unused unused

unused unused unused unused unused unused BCD numbers. In some applications, such as in the financial industry, the errors that can creep in due to converting numbers back and forth between decimal and binary is unacceptable. For these applications

More information

SAS 9 Programming Enhancements Marje Fecht, Prowerk Consulting Ltd Mississauga, Ontario, Canada

SAS 9 Programming Enhancements Marje Fecht, Prowerk Consulting Ltd Mississauga, Ontario, Canada SAS 9 Programming Enhancements Marje Fecht, Prowerk Consulting Ltd Mississauga, Ontario, Canada ABSTRACT Performance improvements are the well-publicized enhancement to SAS 9, but what else has changed

More information

COMP 250 Fall recurrences 2 Oct. 13, 2017

COMP 250 Fall recurrences 2 Oct. 13, 2017 COMP 250 Fall 2017 15 - recurrences 2 Oct. 13, 2017 Here we examine the recurrences for mergesort and quicksort. Mergesort Recall the mergesort algorithm: we divide the list of things to be sorted into

More information

Chapter 1 Summary. Chapter 2 Summary. end of a string, in which case the string can span multiple lines.

Chapter 1 Summary. Chapter 2 Summary. end of a string, in which case the string can span multiple lines. Chapter 1 Summary Comments are indicated by a hash sign # (also known as the pound or number sign). Text to the right of the hash sign is ignored. (But, hash loses its special meaning if it is part of

More information

Introduction to Computer Science and Business

Introduction to Computer Science and Business Introduction to Computer Science and Business This is the second portion of the Database Design and Programming with SQL course. In this portion, students implement their database design by creating a

More information

CS 251 Intermediate Programming Java Basics

CS 251 Intermediate Programming Java Basics CS 251 Intermediate Programming Java Basics Brooke Chenoweth University of New Mexico Spring 2018 Prerequisites These are the topics that I assume that you have already seen: Variables Boolean expressions

More information

Data Types Literals, Variables & Constants

Data Types Literals, Variables & Constants VISUAL BASIC Data Types Literals, Variables & Constants Copyright 2013 Dan McElroy Under the Hood As a DRIVER of an automobile, you may not need to know everything that happens under the hood, although

More information

Excerpt from "Art of Problem Solving Volume 1: the Basics" 2014 AoPS Inc.

Excerpt from Art of Problem Solving Volume 1: the Basics 2014 AoPS Inc. Chapter 5 Using the Integers In spite of their being a rather restricted class of numbers, the integers have a lot of interesting properties and uses. Math which involves the properties of integers is

More information

Package deductive. June 2, 2017

Package deductive. June 2, 2017 Package deductive June 2, 2017 Maintainer Mark van der Loo License GPL-3 Title Data Correction and Imputation Using Deductive Methods LazyData no Type Package LazyLoad yes Attempt

More information

Chapter 9: Dealing with Errors

Chapter 9: Dealing with Errors Chapter 9: Dealing with Errors What we will learn: How to identify errors Categorising different types of error How to fix different errors Example of errors What you need to know before: Writing simple

More information

Operations On Data CHAPTER 4. (Solutions to Odd-Numbered Problems) Review Questions

Operations On Data CHAPTER 4. (Solutions to Odd-Numbered Problems) Review Questions CHAPTER 4 Operations On Data (Solutions to Odd-Numbered Problems) Review Questions 1. Arithmetic operations interpret bit patterns as numbers. Logical operations interpret each bit as a logical values

More information

Package essurvey. August 23, 2018

Package essurvey. August 23, 2018 Package essurvey August 23, 2018 Title Download Data from the European Social Survey on the Fly Version 1.0.2 BugReports https://github.com/ropensci/essurvey/issues Download data from the European Social

More information

Introduction to Computer Programming in Python Dr. William C. Bulko. Data Types

Introduction to Computer Programming in Python Dr. William C. Bulko. Data Types Introduction to Computer Programming in Python Dr William C Bulko Data Types 2017 What is a data type? A data type is the kind of value represented by a constant or stored by a variable So far, you have

More information

Binary Diagnostic Tests Clustered Samples

Binary Diagnostic Tests Clustered Samples Chapter 538 Binary Diagnostic Tests Clustered Samples Introduction A cluster randomization trial occurs when whole groups or clusters of individuals are treated together. In the twogroup case, each cluster

More information

\n is used in a string to indicate the newline character. An expression produces data. The simplest expression

\n is used in a string to indicate the newline character. An expression produces data. The simplest expression Chapter 1 Summary Comments are indicated by a hash sign # (also known as the pound or number sign). Text to the right of the hash sign is ignored. (But, hash loses its special meaning if it is part of

More information

MARK CARPENTER, Ph.D.

MARK CARPENTER, Ph.D. MARK CARPENTER, Ph.D. Module 5 : SAS Functions Introduction to SAS Programming and Applications Descrip(on. In this module, we with various SAS Func7ons, including numerical func7ons, date func7ons and

More information

K Reference Card. Complete example

K Reference Card. Complete example K Reference Card Complete example package examples.example1 annotation doc : String class Date class Person { name : String age : Int ssnr : Int @doc("employee inherits from Person") class Employee extends

More information

FusionDB: Conflict Management System for Small-Science Databases

FusionDB: Conflict Management System for Small-Science Databases Project Number: MYE005 FusionDB: Conflict Management System for Small-Science Databases A Major Qualifying Project submitted to the faculty of Worcester Polytechnic Institute in partial fulfillment of

More information

Parsing and Pattern Recognition

Parsing and Pattern Recognition Topics in IT 1 Parsing and Pattern Recognition Week 02 String searching and finite-choice languages College of Information Science and Engineering Ritsumeikan University 1 this week string comparison brute

More information

The SPL Programming Language Reference Manual

The SPL Programming Language Reference Manual The SPL Programming Language Reference Manual Leonidas Fegaras University of Texas at Arlington Arlington, TX 76019 fegaras@cse.uta.edu February 27, 2018 1 Introduction The SPL language is a Small Programming

More information

Programming R. Manuel J. A. Eugster. Chapter 4: Writing your own functions. Last modification on May 15, 2012

Programming R. Manuel J. A. Eugster. Chapter 4: Writing your own functions. Last modification on May 15, 2012 Manuel J. A. Eugster Programming R Chapter 4: Writing your own functions Last modification on May 15, 2012 Draft of the R programming book I always wanted to read http://mjaeugster.github.com/progr Licensed

More information

Protection of the Texts Using Base64 and MD5 Mohammad A. AlAhmad 1,a, Imad Fakhri Al Shaikhli 1,b, Hanady Mohammad Ahmad 2,c 1

Protection of the Texts Using Base64 and MD5 Mohammad A. AlAhmad 1,a, Imad Fakhri Al Shaikhli 1,b, Hanady Mohammad Ahmad 2,c 1 Protection of the Texts Using Base64 and MD5 Mohammad A. AlAhmad 1,a, Imad Fakhri Al Shaikhli 1,b, Hanady Mohammad Ahmad 2,c 1 Department of Computer Science, International Islamic University Malaysia,

More information

Jin-Soo Kim Systems Software & Architecture Lab. Seoul National University. Integers. Spring 2019

Jin-Soo Kim Systems Software & Architecture Lab. Seoul National University. Integers. Spring 2019 Jin-Soo Kim (jinsoo.kim@snu.ac.kr) Systems Software & Architecture Lab. Seoul National University Integers Spring 2019 4190.308: Computer Architecture Spring 2019 Jin-Soo Kim (jinsoo.kim@snu.ac.kr) 2 A

More information

Microsoft Access XP (2002) - Advanced Queries

Microsoft Access XP (2002) - Advanced Queries Microsoft Access XP (2002) - Advanced Queries Group/Summary Operations Change Join Properties Not Equal Query Parameter Queries Working with Text IIF Queries Expression Builder Backing up Tables Action

More information

Package varhandle. R topics documented: July 4, 2018

Package varhandle. R topics documented: July 4, 2018 Version 2.0.3 Date 2018-07-04 Title Functions for Robust Variable Handling Author [aut, cre] Package varhandle July 4, 2018 Maintainer Depends R (>= 3.0.1), Imports utils, graphics

More information

Package validara. October 19, 2017

Package validara. October 19, 2017 Type Package Title Validate Brazilian Administrative Registers Version 0.1.1 Package validara October 19, 2017 Maintainer Gustavo Coelho Contains functions to validate administrative

More information

COMPUTING SUBJECT KNOWLEDGE AUDIT

COMPUTING SUBJECT KNOWLEDGE AUDIT COMPUTING SUBJECT KNOWLEDGE AUDIT Use this needs analysis to help self-assess and track your computing subject knowledge. Topic Area 1 Computational thinking Define, explain and use these concepts with

More information

A Small Interpreted Language

A Small Interpreted Language A Small Interpreted Language What would you need to build a small computing language based on mathematical principles? The language should be simple, Turing equivalent (i.e.: it can compute anything that

More information

Using Custom Number Formats

Using Custom Number Formats APPENDIX B Using Custom Number Formats Although Excel provides a good variety of built-in number formats, you may find that none of these suits your needs. This appendix describes how to create custom

More information

The System Transcript, Class Point and Inspectors

The System Transcript, Class Point and Inspectors Module 4 1 Module 4: The System Transcript, Class Point and Inspectors This module starts by introducing the System Transcript, illustrating how it can be used with a number of examples. The Transcript

More information

CompuScholar, Inc. 9th - 12th grades

CompuScholar, Inc. 9th - 12th grades CompuScholar, Inc. Alignment to the College Board AP Computer Science A Standards 9th - 12th grades AP Course Details: Course Title: Grade Level: Standards Link: AP Computer Science A 9th - 12th grades

More information

Haskell 98 in short! CPSC 449 Principles of Programming Languages

Haskell 98 in short! CPSC 449 Principles of Programming Languages Haskell 98 in short! n Syntax and type inferencing similar to ML! n Strongly typed! n Allows for pattern matching in definitions! n Uses lazy evaluation" F definition of infinite lists possible! n Has

More information

PROFILE_<PARAM>_QC. What should the variable be and how should it be defined?

PROFILE_<PARAM>_QC. What should the variable be and how should it be defined? PROFILE__QC The PROFILE__QC variables are defined to be the worst QC flag of any level in the profile. A concern was expressed that this definition will lead to a misinterpretation of the

More information

The RaschSampler Package

The RaschSampler Package The RaschSampler Package November 9, 2006 Type Package Title Rasch Sampler Version 0.8.0 Date 2006-10-07 Author Reinhold Hatzinger, Patrick Mair, Norman Verhelst Maintainer Depends stats

More information

Package librarian. R topics documented:

Package librarian. R topics documented: Package librarian July 8, 2018 Title Install, Update, Load Packages from CRAN and 'GitHub' in One Step Version 1.3.0 Automatically install, update, and load 'CRAN' and 'GitHub' packages in a single function

More information

CS 231 Data Structures and Algorithms, Fall 2016

CS 231 Data Structures and Algorithms, Fall 2016 CS 231 Data Structures and Algorithms, Fall 2016 Dr. Bruce A. Maxwell Department of Computer Science Colby College Course Description Focuses on the common structures used to store data and the standard

More information

Summer School on Post-Quantum Cryptography 2017, TU Eindhoven Exercises on Hash-based Signature Schemes

Summer School on Post-Quantum Cryptography 2017, TU Eindhoven Exercises on Hash-based Signature Schemes Summer School on Post-Quantum Cryptography 2017, TU Eindhoven Exercises on Hash-based Signature Schemes 1 Lamport Consider Lamport s one-time signature scheme. Let messages be of length n and assume that

More information

CS-211 Fall 2017 Test 1 Version Practice For Test on Oct. 2, Name:

CS-211 Fall 2017 Test 1 Version Practice For Test on Oct. 2, Name: CS-211 Fall 2017 Test 1 Version Practice For Test on Oct. 2, 2017 True/False Questions... Name: 1. (10 points) For the following, Check T if the statement is true, the F if the statement is false. (a)

More information

Package XRJulia. October 20, 2017

Package XRJulia. October 20, 2017 Type Package Title Structured Interface to 'Julia' Version 0.7.6 Date 2017-10-20 Author John M. Chambers Package XRJulia October 20, 2017 Maintainer John Chambers A 'Julia' interface

More information

Semi-free start collision attack on Blender

Semi-free start collision attack on Blender Semi-free start collision attack on Blender Xu Liangyu and Li Ji Sony China Research Laboratory {Liangyu.Xu, Ji.Li}@sony.com.cn Abstract. Blender is a cryptographic hash function submitted to NIST s SHA3

More information

Faculty of Science FINAL EXAMINATION

Faculty of Science FINAL EXAMINATION Faculty of Science FINAL EXAMINATION COMPUTER SCIENCE COMP 250 INTRODUCTION TO COMPUTER SCIENCE Examiner: Prof. Michael Langer April 27, 2010 Associate Examiner: Mr. Joseph Vybihal 9 A.M. 12 P.M. Instructions:

More information

x = 3 * y + 1; // x becomes 3 * y + 1 a = b = 0; // multiple assignment: a and b both get the value 0

x = 3 * y + 1; // x becomes 3 * y + 1 a = b = 0; // multiple assignment: a and b both get the value 0 6 Statements 43 6 Statements The statements of C# do not differ very much from those of other programming languages. In addition to assignments and method calls there are various sorts of selections and

More information

Package datetimeutils

Package datetimeutils Type Package Title Utilities for Dates and Times Version 0.2-12 Date 2018-02-28 Package datetimeutils March 10, 2018 Maintainer Utilities for handling dates and times, such as selecting

More information

Lecture Overview. [Scott, chapter 7] [Sebesta, chapter 6]

Lecture Overview. [Scott, chapter 7] [Sebesta, chapter 6] 1 Lecture Overview Types 1. Type systems 2. How to think about types 3. The classification of types 4. Type equivalence structural equivalence name equivalence 5. Type compatibility 6. Type inference [Scott,

More information

Experiences in Building a Compiler for an Object-Oriented Language

Experiences in Building a Compiler for an Object-Oriented Language Experiences in Building a Compiler for an Object-Oriented Language José de Oliveira Guimarães Departamento de Computação UFSCar, São Carlos - SP, Brazil jose@dc.ufscar.br Abstract Traditionally books on

More information

Classes, Objects, and OOP in Java. June 16, 2017

Classes, Objects, and OOP in Java. June 16, 2017 Classes, Objects, and OOP in Java June 16, 2017 Which is a Class in the below code? Mario itsame = new Mario( Red Hat? ); A. Mario B. itsame C. new D. Red Hat? Whats the difference? int vs. Integer A.

More information

Project 3: Base64 Content-Transfer-Encoding

Project 3: Base64 Content-Transfer-Encoding CMSC 313, Computer Organization & Assembly Language Programming Section 0101 Fall 2001 Project 3: Base64 Content-Transfer-Encoding Due: Tuesday November 13, 2001 Objective The objectives of this programming

More information

POL 345: Quantitative Analysis and Politics

POL 345: Quantitative Analysis and Politics POL 345: Quantitative Analysis and Politics Precept Handout 1 Week 2 (Verzani Chapter 1: Sections 1.2.4 1.4.31) Remember to complete the entire handout and submit the precept questions to the Blackboard

More information

Package crossword.r. January 19, 2018

Package crossword.r. January 19, 2018 Date 2018-01-13 Type Package Title Generating s from Word Lists Version 0.3.5 Author Peter Meissner Package crossword.r January 19, 2018 Maintainer Peter Meissner Generate crosswords

More information

Final Programming Project

Final Programming Project Due Thursday, Dec. 7, at 5:00 pm Logistics This assignment should be completed in groups of 3. This is not optional -- you are not allowed to complete it on your own, or in groups of any other size. I

More information

Project 1. due date Sunday July 8, 2018, 12:00 noon

Project 1. due date Sunday July 8, 2018, 12:00 noon Queens College, CUNY, Department of Computer Science Object-oriented programming in C++ CSCI 211 / 611 Summer 2018 Instructor: Dr. Sateesh Mane c Sateesh R. Mane 2018 Project 1 due date Sunday July 8,

More information

Day05 A. Young W. Lim Sat. Young W. Lim Day05 A Sat 1 / 14

Day05 A. Young W. Lim Sat. Young W. Lim Day05 A Sat 1 / 14 Day05 A Young W. Lim 2017-10-07 Sat Young W. Lim Day05 A 2017-10-07 Sat 1 / 14 Outline 1 Based on 2 Structured Programming (2) Conditions and Loops Conditional Statements Loop Statements Type Cast Young

More information

SAS Graphics Macros for Latent Class Analysis Users Guide

SAS Graphics Macros for Latent Class Analysis Users Guide SAS Graphics Macros for Latent Class Analysis Users Guide Version 2.0.1 John Dziak The Methodology Center Stephanie Lanza The Methodology Center Copyright 2015, Penn State. All rights reserved. Please

More information

Introduction to Software Security Hash Functions (Chapter 5)

Introduction to Software Security Hash Functions (Chapter 5) Introduction to Software Security Hash Functions (Chapter 5) Seong-je Cho Spring 2018 Computer Security & Operating Systems Lab, DKU Sources / References Textbook, Chapter 5. An Illustrated Guide to Cryptographic

More information

EDMS. Architecture and Concepts

EDMS. Architecture and Concepts EDMS Engineering Data Management System Architecture and Concepts Hannu Peltonen Helsinki University of Technology Department of Computer Science Laboratory of Information Processing Science Abstract

More information